Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
a43be7341e3d13810d20b9e64e329c83.exe
Resource
win7-20240215-en
General
-
Target
a43be7341e3d13810d20b9e64e329c83.exe
-
Size
6.4MB
-
MD5
a43be7341e3d13810d20b9e64e329c83
-
SHA1
ad582a30ba365885be34fe503c744088d08b4baa
-
SHA256
e2c83783d6ab57ac91d99bfb9d607d0b5537e305661406bbf2347c3af92d3464
-
SHA512
cf79fcf60158a33adb39351b4626e8012e737acf4633b882c75240b21480ac1cc91e811c8b351f6e499b689d15b87054cc185c5d54e8e0d628b8b13bfc3bd877
-
SSDEEP
98304:oSilBhaEFMX+MEGi6OEJ0ehjDhGSib2RDWBXW4Gd72eg7GpAadkBlsr1SFF0:KhaIRMEXehxitdogqtqBq9
Malware Config
Extracted
gozi
1001
update1.avast.com
zilbon.ws
update2.avira.com
lumpet.co
emerald.ws
ferroun.in
-
base_path
/sreamble/
-
build
250207
-
dga_season
10
-
exe_type
loader
-
extension
.sre
-
server_id
12
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral1/files/0x00060000000143a8-195.dat family_babadeda -
Executes dropped EXE 3 IoCs
pid Process 2688 a43be7341e3d13810d20b9e64e329c83.tmp 2564 a43be7341e3d13810d20b9e64e329c83.tmp 2380 BouncyDotNET.exe -
Loads dropped DLL 5 IoCs
pid Process 1568 a43be7341e3d13810d20b9e64e329c83.exe 2612 a43be7341e3d13810d20b9e64e329c83.exe 2564 a43be7341e3d13810d20b9e64e329c83.tmp 2564 a43be7341e3d13810d20b9e64e329c83.tmp 2380 BouncyDotNET.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 a43be7341e3d13810d20b9e64e329c83.tmp 2564 a43be7341e3d13810d20b9e64e329c83.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 a43be7341e3d13810d20b9e64e329c83.tmp -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 1568 wrote to memory of 2688 1568 a43be7341e3d13810d20b9e64e329c83.exe 28 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2688 wrote to memory of 2612 2688 a43be7341e3d13810d20b9e64e329c83.tmp 29 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2612 wrote to memory of 2564 2612 a43be7341e3d13810d20b9e64e329c83.exe 30 PID 2564 wrote to memory of 2380 2564 a43be7341e3d13810d20b9e64e329c83.tmp 31 PID 2564 wrote to memory of 2380 2564 a43be7341e3d13810d20b9e64e329c83.tmp 31 PID 2564 wrote to memory of 2380 2564 a43be7341e3d13810d20b9e64e329c83.tmp 31 PID 2564 wrote to memory of 2380 2564 a43be7341e3d13810d20b9e64e329c83.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe"C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\is-0545A.tmp\a43be7341e3d13810d20b9e64e329c83.tmp"C:\Users\Admin\AppData\Local\Temp\is-0545A.tmp\a43be7341e3d13810d20b9e64e329c83.tmp" /SL5="$400E0,5898797,953344,C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe"C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\is-5KGEU.tmp\a43be7341e3d13810d20b9e64e329c83.tmp"C:\Users\Admin\AppData\Local\Temp\is-5KGEU.tmp\a43be7341e3d13810d20b9e64e329c83.tmp" /SL5="$500E0,5898797,953344,C:\Users\Admin\AppData\Local\Temp\a43be7341e3d13810d20b9e64e329c83.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\Bouncy for .NET Helper\BouncyDotNET.exe"C:\Users\Admin\AppData\Roaming\Bouncy for .NET Helper\BouncyDotNET.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5b2c4422bf53fe9c3f879b2adaeb39f56
SHA1b86680698296f9bc244ca21497d8f7adb7f140aa
SHA2562e3c6dbdee96b533c668c9ad731281d2ebf18f3eb1aec8e6efc3175dd28e7e8c
SHA5128732fc79026258e196b9a359437c820440f7b79da48099548d5d4938058dbbe5837d08ef14b270b2c91137ce0a4b4e79b984f886f7378021d2d0152c912b97aa
-
Filesize
5.8MB
MD5e70951807abdec39daefa9a8df9dec15
SHA115a7b0f9c04d5f6bba477d91b502b4e24c1127f6
SHA256dee1253761af168e331e8909cf6afb20b40a95a34400d9717773a77258ac62e6
SHA512bd87a44e078a9e589b70419f9ba876e067bc549679962faf0a5f96d5f0d0167654adb53b2b10e065de8f705bfa51b0fed09fb3ce28d5014e4260b96dc64fa624
-
Filesize
5KB
MD59325aee138a4d9a15d651920fb403ffc
SHA119eb57cd989571fa8cd426cbd680430c0e006408
SHA2569c8346c7f288e63933ebda42cbb874f76067c48198b01adfb63bccfa11970c35
SHA512d3c0ccf217346e44436ac4f9db3e71b6d2eb152930005f019db5b58dcce923d94007e77fa5b938e182073c2e55163e886853b00e3fc22f135d70854120a218a8
-
Filesize
304KB
MD52b622a85fd2b0b5531c86301818ceb2f
SHA15e1d127789e78683ce3deee1fd3e38f358bc50c2
SHA25658489a55f9eb210b9e472ca21621ce544e03a2e026f0fa103c1a58102d39c025
SHA512938d7ac9239568536a341c057a44142faad4921bbff5bcc76a89b0b4ed5343f324a46e6c533a9673434286673c4b5efbe4a8156d10c20a2760389ac785a34ce4
-
Filesize
3.1MB
MD58a24adf60923719e71306f56deb49ebc
SHA1e098600fd5a98bc37d0d887e705a32a54bf4ae84
SHA256221643457442624e98646e2e6f8a6ec7d8d79f9830d13cb168f69e60e69b0085
SHA512dfbc2fcd389e07c4a2fcf7ce440f079022bc40c1b957c6bd89e7dc33695c0e80b5ecbcc823c44c68f80ce791ee065d39d7042b0579f736c786451f0183c6c02a
-
Filesize
3.9MB
MD56a2893e3b339c30e310621e43f95dce9
SHA17c0894efb1fec55acf8d44c9cf4d400975813a21
SHA2562a43b0bc4490feef1f0176c97131fa073c8d7093e16b0f8f356a5bf8fb234a03
SHA512cccd371e990e6cde58620943a5374d4ab82c0ef8c98e4bb2a53a3c22c2dccc20248568ba8d2ddb6bdad32f6332e3bd167c031b1c278391d4c6e884605d0a2523
-
Filesize
3.4MB
MD50f52f805adef42d5d0456f566e43bc12
SHA179ca21a86270c940b72fbca19b365e52d828035d
SHA256430b5ba6a3ec6b7a5c2e021b19afea3406dc7bb4007ceb46360ed4d12db12bb1
SHA512d5ab40d77cf81b579035d0b2f2dd0817e0ca55166443a636d781e23f5566b5decf857344e1e3f50fca20729197d1ef12d693834079493dc3d402fa8f1c70aa72
-
Filesize
3.8MB
MD54240767ecbcecd84f3c90d0ee889460c
SHA1d390f9e165408864dda6c925dfe6627c557a6b24
SHA2561d1e59b6a67e1f4ecc8516c384291655d4c51f7f91168e6b593f5f8919bffdc3
SHA51289fe2e6cc6a1480d8a42efe2b694b3b677967b7656326fcf8453c7f484d92f450be65c6c2639cd08131dbc58e0d34ee696bf1b263227e34d2ac91c4aaa7aee61